1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
3 years ago
15

What is the biggest danger when you reveal information such as your Social Security number?

Computers and Technology
2 answers:
Dima020 [189]3 years ago
6 0

based off my knowledge im gonna to go with OPTION A because ur social security number holds information like your brith etc

Mars2501 [29]3 years ago
6 0
Umm I’m gonna say A also
You might be interested in
What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative
jarptica [38.1K]

Answer: PKI certificates

Explanation: PKI is known as the public key infrastructure which is commonly used for the encryption of the data and also for the data signing. They have the ability to assign the keys pair.

PKI certificates are in the form of strings of alpha-numeric running for a mathematical functions. They use the third party protocols for the execution and they are widely accepted by the authoritative identity.

5 0
3 years ago
Explain the differences between copyright, fair use, and trademark?
ValentinkaMS [17]

A trademark is an easily recognizable symbol, phrase, or word that denotes a specific product. It legally differentiates a product or service from all others of its kind and recognizes the source company's ownership of the brand.

"Copyright" literally means the right to copy but has come to mean that body of exclusive rights granted by law to copyright owners for protection of their work. Copyright protection does not extend to any idea, procedure, process, system, title, principle, or discovery.

Fair use is a doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder.

7 0
3 years ago
You were replying to e-mail when suddenly your computer started to display random messages, and stopped responding to keyboard a
Romashka-Z-Leto [24]
I think it’s A have no idea tho
7 0
4 years ago
explain why the database system would not allow a tuple to be inserted into the database through this view
Andrej [43]
For the view of Exercise 4.18, explain why the database system would not allow a tuple to be inserted into the database through this view.
For reference
For the database of Figure 4.12, write a query to find the ID of each employee with no manager. Note that an employee may simply have no manager listed or may have a null manager. Write your query using an outer join and then write it again using no outer join at all.
OUTER JOIN
select e.ID from employee e left outer join manages m on e.ID = m.ID
where m.manager_id is null;
NO OUTER
select e.ID from employee e where e.ID not in (select m.ID from manages m) or e.ID in (select m.ID from manages m where m.manager_id is null);
6 0
3 years ago
The current in a resistor is 5.0 A, and its power is 60 W. What is the voltage?
alexandr1967 [171]

The voltage on a resistor will be "12 V".

According to the given question,

Current,

  • I = 5.0 A

Power,

  • P = 60

As we know the formula,

→ Power (P)= Current(I)\times Voltage (V)

or,

→              V = \frac{P}{I}

By putting the giving values, we get

→                  = \frac{60}{5}

→                  = 12 \ V

Thus the solution above is right.

Learn more about voltage here:

brainly.com/question/18883096

8 0
3 years ago
Read 2 more answers
Other questions:
  • When desktop publishing software can interact with another software program, the two are said to
    6·1 answer
  • What are examples of some Exotic currencies?
    14·1 answer
  • When selecting current page from the print range, on the print dialong box it will print
    5·1 answer
  • How do you read a column
    8·1 answer
  • Powerpoint assumes that the first slide in a new presentation is the
    10·1 answer
  • Was the type writer the first part of the keyboard? ​
    8·1 answer
  • PLEASE HELP. I’ll mark you BRAINLIST <br> Please read the comment under this question
    9·1 answer
  • A ……………………………is used to verify the identity of a website and is issued to the owner of the website by an independent and recogni
    7·2 answers
  • Meera has created a small program in Python. She wants to store elements of the same data type in an organized
    7·1 answer
  • Whats the flow in this code, and whats the risk that its creating and what can i do to fix it? (c language)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!